Blockchain-based Authentication Scheme With Arm Implementation
Qiang Li (VP & Chief Scientist, CloudMinds Technology)
Trust & Security
50-Minute Technical Session
Audience Level: All
Blockchain is a decentralized, trustless, and distributed database with guaranteed data consistency even in the event of temporary node failure or network segment failure. In this presentation, we will discuss our adoption of blockchain for security applications, specifically as the foundation for authentication mechanism. We will present specific Arm implementation of the scheme. Due to the distributed nature of blockchain, our solution has high availability and scalability, and it is robust against attacks. This presentation will cover support for Software Defined Perimeters (SDP) for cloud service protection and for network protection, FIDO authentication, and mobile device authentication for large scale IoT systems.
Blockchain applied to security applications, SDP implementation using blockchain, ARM implementation of blockchain
Some background in computer and network security